CVE-2025-57834

| EUVD-2025-209251 HIGH
2026-04-06 mitre GHSA-pwpp-jvrh-rhmv
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Apr 06, 2026 - 19:45 vuln.today
EUVD ID Assigned
Apr 06, 2026 - 19:45 euvd
EUVD-2025-209251
CVE Published
Apr 06, 2026 - 00:00 nvd
HIGH 7.5

Description

An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modem (Exynos 980, 850, 990, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 1680, 9110, W920, W930, W1000, Modem 5123, Modem 5300, Modem 5400, and Modem 5410). The absence of proper input validation leads to a Denial of Service.

Analysis

Denial of Service in Samsung Exynos processors and modems (including 980, 850, 990, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 1680, 9110, W920, W930, W1000, and Modems 5123, 5300, 5400, 5410) allows unauthenticated remote attackers to cause complete service disruption via network-based attacks requiring low complexity and no user interaction. The vulnerability stems from improper input validation (CWE-20) affecting mobile, wearable, and baseband modem chipsets used across Samsung's semiconductor product line. No public exploit identified at time of analysis, though the CVSS vector indicates trivial exploitation conditions (AV:N/AC:L/PR:N/UI:N) that could enable network-accessible denial of service attacks against devices containing these chipsets.

Technical Context

This vulnerability affects Samsung's Exynos system-on-chip (SoC) processors spanning mobile processors (Exynos 980, 850, 990, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 1680), wearable processors (Exynos 9110, W920, W930, W1000), and cellular baseband modems (Modem 5123, 5300, 5400, 5410). The root cause is classified as CWE-20 (Improper Input Validation), indicating insufficient sanitization or bounds checking of data received from network interfaces. Exynos processors integrate CPU, GPU, ISP, and cellular modem functionality in mobile and wearable devices, making them critical attack surfaces for network-facing services. The improper validation likely occurs in baseband firmware or network protocol handling code that processes untrusted input from cellular networks or other network interfaces, allowing malformed or unexpected data to trigger resource exhaustion, crashes, or infinite loops that result in complete availability loss.

Affected Products

Samsung Exynos mobile processors including models 980, 850, 990, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, and 1680; Samsung Exynos wearable processors including models 9110, W920, W930, and W1000; and Samsung Exynos cellular modems including models 5123, 5300, 5400, and 5410. These chipsets are integrated into various Samsung Galaxy smartphones, smartwatches, and potentially third-party devices using Samsung semiconductor components. Specific device models and firmware versions were not detailed in available advisories. Comprehensive product security information is available through Samsung Semiconductor's official quality support portal at https://semiconductor.samsung.com/support/quality-support/product-security-updates/ with vulnerability-specific details at https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-54328/.

Remediation

Consult Samsung Semiconductor's official product security updates portal at https://semiconductor.samsung.com/support/quality-support/product-security-updates/ and the CVE-specific advisory at https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-54328/ for patch availability and affected firmware versions. Device manufacturers integrating Exynos chipsets (including Samsung Electronics for Galaxy devices) typically distribute patches through Android security updates or firmware over-the-air (OTA) updates. End users should apply the latest security patches from their device manufacturer when available. Enterprise deployments should monitor Samsung security bulletins and coordinate with device vendors for patch deployment timelines. As a temporary mitigation where patching is not immediately feasible, network-level protections such as anomaly detection on cellular and network interfaces, rate limiting, and intrusion prevention systems may reduce exposure, though these cannot fully address the underlying input validation flaw in chipset firmware.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Share

CVE-2025-57834 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy